National Repository of Grey Literature 339 records found  previous11 - 20nextend  jump to record: Search took 0.02 seconds. 
Cryptography protocol with public key
Fujdiak, Radek ; Rášo, Ondřej (referee) ; Mlýnek, Petr (advisor)
The Master thesis is an introduction to cryptology. The Thesis describe cryptosystems and selects one ideal cypher for low-power microcontroler. In thesis provides manual for instal development program COde Composer Studio, basic implementation of selected cryptosystem with small numbers and suggestion for implementation selected cyptosystem with big numbers.
Security design for system of remote quality measurement of electric power
Jakubíček, Michal ; Koutný, Martin (referee) ; Mlýnek, Petr (advisor)
Bachelor thesis in the first chapter deals with the concept of quality of electric power and its parameters. The next chapter is focused on systems that used remote data collection and the current direction of evolution of these systems. The third of the thesis discusses the symmetric and asymmetric cryptographic systems and their main representatives. The asymmetric system is described by the principle of calculating RSA and Diffie–Hellman. The next part deals with selected libraries that can count large numbers. Through the establishment of key using the Diffie–Hellman with these libraries and the subsequent measurement should be proved whether optimized library is faster than the other libraries. The evaluation of the used library in terms of speed and memory consumption is inculded in the final chapter. The appendix include installation instructions for the libraries BigDigits, GMP and OpenSSL in Visual Studio 2010.
Attribute based authentication
Chwastková, Šárka ; Hajný, Jan (referee) ; Dzurenda, Petr (advisor)
This thesis deals with attribute based credentials. It describes attribute systems, their entities and properties generally. The work concentrates specifically on the attribute system Identity Mixer. The process of communication of the attribute system Identity Mixer is implemented in the language of JavaScript. Application is the web visualization, which describes protocols, entities and generally computes protocols of Identity Mixer with inputs of small numbers or predefined large numbers.
Electromagnetic analysis
Kolofík, Josef ; Reichert, Pavel (referee) ; Martinásek, Zdeněk (advisor)
This thesis deals with electromagnetic analysis and applications of electromagnetic side channel. The first and second part describes the basics of cryptography, function of cryptographic module and side-channel attacks. The third part discusses the electromagnetic analysis, construction of probe, a description of the laboratory workplace, the electromagnetic emission of PIC16F84A, AES and preparation for laboratory measurements. The fourth part describes specific laboratory measurements and extracting the useful signal. In the fifth part of the thesis presents the results of processing the measured values, the outputs generated by scripts and found the link between measured curves and AES encryption key. In the sixth part of the thesis are analyzed the basics of defense against side channel attack.
Optimization of supporting cryptographic operations using hardware
Čurilla, Jakub ; Smékal, David (referee) ; Cíbik, Peter (advisor)
This work deals with the description of FPGA architecture circuits, their structure, VHDL language, FPGA design flow, cryptography and cryptographic operations, and subsequent implementation and realization of support functions for cryptographic operations in VHDL language, their time and performance analysis, and mutual comparison.
The use of artificial intelligence in cryptography
Lavický, Vojtěch ; Rosenberg, Martin (referee) ; Babnič, Patrik (advisor)
Goal of this thesis is to get familiar with problematics of neural networks and commonly used security protocols in cryptography. Theoretical part of the thesis is about neural networks theory and chooses best suitable type of neural network to use in cryptographic model. In practical part, a new type of security protocol is created, using chosen neural network.
User Authentication and Autorization for New Generation Networks
Přibyl, Radek ; Cvrček, Daniel (referee) ; Matoušek, Petr (advisor)
This document describes methods of user authentication and authorisation via a trusted server. There is analysis of the system Kerberos, which is used as an inspiration for desing of a new authentication scheme. There are analysed programming layers and interfaces for specific applications ensuring user authentication and authorisation. The document contains a design and detailed description of a new authentication scheme. This scheme is implemented into the communication between email client and imap server.
Platform Independent Storge of Sensitive Data
Klemens, Jakub ; Herout, Adam (referee) ; Španěl, Michal (advisor)
This thesis addresses the issues when securing sensitive data for Windows, iOS and MacOS, with the target being to create the ideal key-value data storage library. A C++ library has been designed and implemented based on a given facts. The library offers a simple application programming interface for storing data and structuring them into modules. A base functionality is verified by set of unit tests.
Network attacks by Cain & Abel
Smékal, Lukáš ; Stančík, Peter (referee) ; Sobotka, Jiří (advisor)
This Master’s thesis is dealt in the local area network security, cryptographic algorithms, particular attacks on computer networks a practical application these attacks in local area networks. To application particular attacks is used the Cain & Abel program. The detailed manual for this program is created from the results of these attacks. This manual contains the exhibits of usage particular program tools and the attack application exhibits. This manual considers consequences of particular attacks and summarises achieved results during work with tools too. Master thesis closely deals with one of the program tools called RSA SecureID Token Calculator. Authentication via hardware tokens is contained in this Master thesis. Thesis contains the way of authentication using RSA SecureID Token Calculator without physical owning of the hardware token. Cain & Abel program shows and interprets why cashed passwords in operation system are dangerous and it shows methods how attacker can reveal this passwords from the operation system memory. This Master thesis is focused on sniffing credentials and passwords in local area networks and it is focused on cryptographic algorithms cracking for username and passwords revealing.
Security design for system of remote quality measurement of electric power
Jakubíček, Michal ; Koutný, Martin (referee) ; Mlýnek, Petr (advisor)
Bachelor thesis in the first chapter deals with the concept of quality of electric power and its parameters. The next chapter is focused on systems that used remote data collection and the current direction of evolution of these systems. The third of the thesis discusses the symmetric and asymmetric cryptographic systéme and their main representatives. The asymmetric system is described by the principle of calculating RSA and Diffie–Hellman. The next part deals with selected libraries that can count large numbers. Through the establishment of key using the Diffie–Hellman with these libraries. The evaluation of the used library in terms of speed, number of elementary cycles and memory consumption is inculded in the chapter 5. The last chapter explains the optimization focused on Ultra-Low Power MCU and shown Montgomery multiplication and squaring. It describes in detail the procedure of calculation and described why is his calculation faster than conventional modular multiplication and exponentiation. The appendix include installation instructions for the libraries BigDigits, GMP and OpenSSL in Visual Studio 2010.

National Repository of Grey Literature : 339 records found   previous11 - 20nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.